Тёмный

Hide Information in JPEG Files 

NeuralNine
Подписаться 372 тыс.
Просмотров 180 тыс.
50% 1

Опубликовано:

 

2 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 330   
@uday-xyz1523
@uday-xyz1523 3 года назад
imagine people storing credit card info in photos, this is like 'safe behind a painting' but virtual
@user-sz7rp7kr4c
@user-sz7rp7kr4c 3 года назад
People do it but if the police knew about it, you have a Problem 😂
@TheOfficialKingIdea
@TheOfficialKingIdea 3 года назад
Yeah, imagine…
@sergsergesrgergseg
@sergsergesrgergseg 3 года назад
@@Karl2Peter why would u hash credit card info
@cuddenudd7697
@cuddenudd7697 3 года назад
It has already happened, a cyber gang famous for credit frauds has hid it in cat pictures so that isp wouldnt notice
@wazy1852
@wazy1852 3 года назад
We went a full circle
@numberiforgot
@numberiforgot 3 года назад
Before I really started my InfoSec career, I always thought this sort of thing was super drawn out and complicated. Now that I have experience, it’s sort of eye opening to see how easily it can be done.
@manfredpseudowengorz
@manfredpseudowengorz 3 года назад
until someone blocks the input stream on the FFD9
@cckdex
@cckdex 3 года назад
@@manfredpseudowengorz as almost any filetype has identifieres this doesnt matter at all
@mehregankbi
@mehregankbi 3 года назад
don't you think such files should be flagged by windows defender or imageviewer apps?
@MaxCE
@MaxCE 3 года назад
@@mehregankbi yeah this is why another way this is done is change some pixel values to store data as a sort of pattern, can't be normally seen by humans if the image is high res enough
@WolfyTribe
@WolfyTribe 3 года назад
Actually real steganography is done in another way, but similar results. Change the least significant bit (LSB) of rgb element in each pixel so that its odd or even. The pattern of odds and even ( 0 and 1 ) will give you a hidden message when you extract. This way you’re basically altering the real image im a way its not distorted instead of adding to the image.
@marco.nascimento
@marco.nascimento 3 года назад
Quite interesting. We usually know so little about file formats, cool to learn something like that.
@mohammedalshrief532
@mohammedalshrief532 3 года назад
Machine learning pid iron station test
@gauravverma5692
@gauravverma5692 3 года назад
I did this when I was doing my masters 17 years ago, but in bmp
@asiamies9153
@asiamies9153 3 года назад
why
@gauravverma5692
@gauravverma5692 3 года назад
@@asiamies9153 didn't have anything better to do... Had learnt c and had gone through file format... So I was changing specific bits in RGB
@sarahshaub3243
@sarahshaub3243 Год назад
This is great! This was my first time trying steganography and using python and this was super interesting! You did a great job of walking through which each step's purpose was!
@wesleyelder
@wesleyelder 3 года назад
Awesome! The way you explain things is amazing - I always learn alot. Thanks again!
@claudiu7909
@claudiu7909 3 года назад
you can hide zip archive in jpg images using the copy comand in cmd. opening it in 7zip will open the archive, but otherwise it will open as a normal image
@ioim_0
@ioim_0 3 года назад
how exactly if u can wake me through this i would be grateful
@claudiu7909
@claudiu7909 3 года назад
@@ioim_0 this is the comand copy /b image.jpg + archive.zip output.jpg
@ioim_0
@ioim_0 3 года назад
@@claudiu7909 tysm man
@Ph34rNoB33r
@Ph34rNoB33r 3 года назад
Works because a ZIP archive has the metadata at the end (if you add more files to an archive, its metadata is going to grow, so if it's at the end you don't have to move as much data to make space). Learnt about that because back in the 90s, I had some installer that was a shell script with appended zip archive.
@D0Samp
@D0Samp 3 года назад
@@Ph34rNoB33r It's even simpler than that, it even works with e.g. RAR (which doesn't concentrate metadata on members at all, just adds a list of offsets at the end when you add a "quick open header" to RAR5 archives) or 7-Zip (which has the table of contents at the beginning). Archivers just scan the file until they find an archive file signature to support self-extracting archives, which are just an archive appended to an unpacker executable.
@b391i
@b391i 3 года назад
Steganography is a magnificent technique to hide stuff from intruders👌
@thomasgoodwin2648
@thomasgoodwin2648 3 года назад
hmmm interesting thought otd. Given recent advances in ai code suggestions, it makes me wonder if gpt3 could be trained to decompile object code to some reasonable facsimile of the original code. The art of code decompiling is even more mysterious than coding since you have to devine meanings of the symbol table just through sometimes very obscure usage. This might be one more opportunity for ai to really shine. Awesome as always. The most interesting materials are never found on the most beaten path. The best stuff is found in the unknown.
@Rahul-ff1vx
@Rahul-ff1vx 3 года назад
Have been waiting trying to find out how to do these things for months. Thank you so much!!!!!
@TheLazyEntrepreneur04
@TheLazyEntrepreneur04 7 месяцев назад
Imagine a person doing this with a silent miner into others people computer to mine crypto. 😂
@salim.miloudi
@salim.miloudi 3 года назад
Thanks for the content 👍. I've got a question please. Is there a way to automatically extract and launch the executable file in the background after reaching the EOF flag of the image
@D0Samp
@D0Samp 3 года назад
Was a bit disappointed you just appended data to the image file, lots of image upload services just strip data past the end. You can have more success with adding application-specific JPEG segments (APP2..APP15 - APP0 is already used for JFIF and APP1 for Exif) or even encoding hidden messages into the actual quantization matrices.
@wizdakid1842
@wizdakid1842 3 года назад
subbed and liked, this gave me an idea for storing programs in files and extracting then running them
@IzUrBoiKK
@IzUrBoiKK 3 года назад
Lol, this is a funny topic but can be useful (for rick rolls)!
@JohnnyOttosson85
@JohnnyOttosson85 3 года назад
Man, this is awesome. I hope I’ll learn more cool stuff from you.
@evelynx06
@evelynx06 3 года назад
6:46 There is literally a checkbox there that says "Do not ask this question again"
@QuadOctane
@QuadOctane 3 года назад
Quick question - Is it possible to execute a standalone .exe file (which is injected into the .jpg file) when a user opens the .jpg image? Great video btw!
@ahmedyasser8416
@ahmedyasser8416 3 года назад
a very mean way of hacking 🌚
@alien_X1
@alien_X1 3 года назад
works on PC but not on mobile
@started.494
@started.494 3 года назад
@@ahmedyasser8416 حصل يسطا
@unbekannter_Nutzer
@unbekannter_Nutzer 3 года назад
No, the executable file has to have a special byte sequence at the beginning - in x86 times this was "MZ…" if I remember correctly - look it up with a hexcode editor. Maybe for x64 architecture, a variant is used, maybe it is different. But the file has to start with that.
@Quique-sz4uj
@Quique-sz4uj 3 года назад
No, its not possible. As i said in another comment: Thats not how it works at all. You can hide a virus / malicious code in a JPEG or any other file really, the thing is that it doenst get executed because its not an executable. When photoshop for example reads the data from the JPEG file it only reads it (to the FFD9) but it doenst execute the rest of the binary lol. The only way to get a virus from opening a jpeg file is with a third party image reader than executes the bytes after the image.
@mathew6041
@mathew6041 3 года назад
What would happen if the image is being sent through a platform that has image compression, for example whatsapp Will the added data be unharmed?
@KimionTM
@KimionTM 3 года назад
Gotta try it for yourself but i suspect that the data will be stripped off
@Kitulous
@Kitulous 3 года назад
@@KimionTM messengers and social networks almost always reprocess the image in order to compress it, so yeah, it will definitely be stripped off
@nemanjakukic4519
@nemanjakukic4519 3 года назад
No need for python here. For bash/zsh, this will do: `cat heart.png >> photo.jpeg`. It will work with any other file :D Windows shell uses `type` instead of `cat`.
@kantasisg
@kantasisg 3 года назад
Good thinking but how you'd suggest extracting the heart.png from the jpeg in bash?
@robinferizi9073
@robinferizi9073 3 года назад
This is cool because it means we can have a way to hide data on open networks, and when sending things to people, or just simply to hide things on your own device, like your you know what photos
@ApiolJoe
@ApiolJoe 3 года назад
You don't want to send data this way on open networks, it's just not secure.
@robinferizi9073
@robinferizi9073 3 года назад
@@ApiolJoe not necessarily when people who know what they’re doing involved, but when you have a network full of people who don’t know their way around a computer properly, this is great
@ApiolJoe
@ApiolJoe 3 года назад
@@robinferizi9073 if they don't know their way around a computer, you don't need this.
@robinferizi9073
@robinferizi9073 3 года назад
@@ApiolJoe true
@theclockworkcadaver7025
@theclockworkcadaver7025 3 года назад
@@ApiolJoe Security by obscurity is a legitimate thing. It's only insecure if someone is looking at what you're doing very closely, and looking _specifically_ for this technique -- in which case, you probably wouldn't get past them anyway.
@FridgeFucker96
@FridgeFucker96 3 года назад
Bro your explanations are so clear! You deserve all the subscribers you got and you should have even more!
@mohammedalshrief532
@mohammedalshrief532 3 года назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-KXNRlJPkWIk.html❤💝🙈❤
@mohammedalshrief532
@mohammedalshrief532 3 года назад
Pid machine learning iron station
@VladimirOrlov-smr
@VladimirOrlov-smr 3 года назад
Очень примитивный метод сокрытия информации, но в качестве практики для работы с файлами на Python пойдёт
@damnryder
@damnryder 2 года назад
is it possible to execute the exe file while opening the jpg file in which we hide exe?
@dovahkiin516
@dovahkiin516 3 года назад
I downloaded a random image off the internet so I could do this on. I couldn't figure out why I couldn't get it to read, I was able to write to the jpg. Turns out it already has another hidden message inside it that's more complicated to extract lol.
@avizaguri5823
@avizaguri5823 3 года назад
Is it possible to execute the .exe file from the image? I mean, when I open the image, the exe will execute
@luphoria
@luphoria 3 года назад
It's possible. Probably, at least. Is it realistic? No
@neptuneairslash3867
@neptuneairslash3867 3 года назад
Why did it take me until now to realize the python logo can be seen as either 2 pythons or a fat dude sitting in a chair.
@santiagohernandez6615
@santiagohernandez6615 Год назад
Awesome this was really interesthing and useful, thanks NeuralNine
@eyosiyas_js
@eyosiyas_js 3 года назад
That's Insane my man. I really appreciate u. Thanks
@raghuramelancheran9979
@raghuramelancheran9979 2 года назад
Very informative. But I've a question. Let's say I download some jpeg by mistake, which has hidden exe. How can someone make this exe extract itself and run on my device? What are the steps I can do to prevent that from happening? Because tbh there is no way to know which image is infected and which isn't, and it's not possible to stay away from downloading images at all. Should I write a python code to check the images by myself? And will that exe stay inside the image safely till I'm able to verify the image using python?
@boogychan
@boogychan 9 месяцев назад
That's interesting.
@tarrvey5619
@tarrvey5619 3 года назад
I really appreciate these kind of videos. You explaining Stuff which I didnt know existed. Really Cool, now I'm never gonna click a jpeg lol.Hope you get a 100k in a couple of weeks.
@donnykim9822
@donnykim9822 7 месяцев назад
A problem I found with the hello world part is the FF D9 is always at the end of jpg file, BUT it does not mean FF D9 cannot appear elsewhere in the file. In my case, I found a jpg file that had FF D9 in 2 other separate spots than at the end.
@einsteinwallah2
@einsteinwallah2 3 года назад
this is no hiding because such thngs become well known and soon tools to extract such hidden info starts surfacing not to speak of such videos explaining it all in baby steps to python ignorants or python lazy ... give us true steganography algorithms
@luphoria
@luphoria 3 года назад
You wont find this in a beginner Python course...sorry haha
@RagHelen
@RagHelen 3 года назад
But why? It is good for nothing. Moreover, exe files have inital sequences, too, and if antiviral software detects these inside an image file, they will got to defcon 1. You actually increase the probailty of being detected dramatically.
@Tristoo
@Tristoo 3 года назад
bruh. here I thought you were actually gonna do something smart with pixels. you're also banking on the parser not checking for bigger file size, I doubt it's actually part of the spec that you can just have whatever there. Basically making a 16m long video to say "do a concat".
@excalizan7697
@excalizan7697 3 года назад
I was just curious about that... Thanks NeuralNine!
@NeuralNine
@NeuralNine 3 года назад
^^
@thomasgoodwin2648
@thomasgoodwin2648 3 года назад
Mind if you do come across something in the wilds of the net I wouldn't run it unless you really know what you're doing. (Sandbox VM, profilers, decompilers, etc)
@mrZzz675
@mrZzz675 9 месяцев назад
Excellent Content !!Thank You!!!
@novianindy887
@novianindy887 Год назад
4:02 what happens if we omit b in b"Hello World" ? Cant string be added to the file ?
@eymenknx1004
@eymenknx1004 18 дней назад
Files and sockets work with bytes. To get it out as a raw string you have to write a few lines of code
@yannemalovskiy8846
@yannemalovskiy8846 3 года назад
Thanks a lot for your vids! Great job!
@rons96
@rons96 3 месяца назад
this is cool, by obvious for people searching for a payload. Why modify the pixels like the png steganography tutorial don't work with jpeg? Thank you btw for this video
@Prabhatsingh-mr1bv
@Prabhatsingh-mr1bv 3 года назад
This guy deletes the original file with full confidence 🤣
@rafaelfonseca7942
@rafaelfonseca7942 6 месяцев назад
Thought you'd show how to open an image and have an executable run somehow also. Anyway, liked these image tricks!
@miryamadvanced
@miryamadvanced 2 года назад
please make one clip for hide payload apk in image for hack android using image
@MJRgroep
@MJRgroep 2 года назад
JACKPOT!! first of all great vid! and second THNX to all users for placing comments here! with all posted 'script' and occured 'error' copied&pasted messages i was able to make some nasty googledork lines. what appeared to be random non related searchresults containing a lot of links to just empty white webpages,image results showing just 1 simple colour or replacement txt error versions. first it did not make sence to me at all. But i found out the hardway a imagefile CAN be executed if downloaded or bij simply following and click the link! hooks hooks and more hooks. a 18gb payload burst deliverd by,... a shitty icon image!! that thinny small image on top of every tab is more dangerous then all those "weakpoint" plugin extensions. it bypasses the browserframework,settles in your temp file,appdat file etc.. a icon (18gb zise) well,.... hope those who will find thiss too have fast internet! it brakes the browser almost into freezing up.
@viane123456
@viane123456 3 года назад
Its just a steganography, Better to use encryption before just adding a normal message
@fflecker
@fflecker 9 месяцев назад
Thanks a lot. What' s about PNG, TIFF and PDF ? Did you make additional experiments ?
@hwzzegwggs8029
@hwzzegwggs8029 3 года назад
Thank you for this video
@NeuralNine
@NeuralNine 3 года назад
thanks for watching!
@saultamez7660
@saultamez7660 2 года назад
@@NeuralNine what Hex Editor software are you using currently? I am trying to find those that are for free.
@Manuel-j3q
@Manuel-j3q 3 года назад
Rare jpeg market stocks goes down after this video.
@doomanime61
@doomanime61 3 года назад
So Dr Mike pound wasn't wrong :)
@joiverx1227
@joiverx1227 3 года назад
you can just click dont show this again
@addy405
@addy405 19 дней назад
Cheerio are amazhign cerial to eat while watching theseeeee
@bloodyyjohnson7004
@bloodyyjohnson7004 3 года назад
Thank you so much, I always wanted to know how it works, I know I say this every time you see my messages or comments, but you are the holy grail. You learned me so much thing since that last 2 years ! big love on you bro
@NeuralNine
@NeuralNine 3 года назад
thanks for your kind comment brother :)
@thecashewtrader3328
@thecashewtrader3328 3 года назад
Wow
@thomasipad7719
@thomasipad7719 3 года назад
If the JPEG ends at that 2 Bytes, why not just append the binary? Like “cat binary.exe >> image.jpg”
@thomasipad7719
@thomasipad7719 3 года назад
@Dee_lan Of course. You just need to find the 4 bytes and then write out the rest. But when creating the files, you can simply append and be finished.
@luphoria
@luphoria 3 года назад
There is nothing wrong with this approach :p. The target of this video is beginner CS students that are interested in cybersec, I think, so they are less comfy with cmd or sh D:
@its_code
@its_code Год назад
Can I run exe inside jpg😢😢😢
@rajeshroshan2877
@rajeshroshan2877 3 года назад
But how would you execute that .exe file embedded in the image file?
@akshitsingh6429
@akshitsingh6429 3 года назад
Extract the byte data to another file, then run it
@creeperizak8971
@creeperizak8971 3 года назад
@@akshitsingh6429 yeah
@rajeshroshan2877
@rajeshroshan2877 3 года назад
@@akshitsingh6429 Thank you! But I was wondering if there's a way to run the .exe when the image is clicked or pressed if on a phone.
@ellie-g9o
@ellie-g9o 2 года назад
@@rajeshroshan2877 That would be a huge security risk, think about it. It's definitely not possible, at least without exploiting bugs
@viorisewastaken
@viorisewastaken 3 года назад
So that's why TF2 only works with the coconut.jpg
@cristinocanga
@cristinocanga 2 года назад
Know I'm afraid of opening jpeg file Or any file hahaha
@goranbekic1911
@goranbekic1911 3 года назад
Does this work as the old DOS copy /b command? If so, if I remember correctly, you can skip the extraction part and just change the extension to which part you want to see (e.g. photo.jpg opens in photo editor, photo.txt opens in notepad and shows just the text Hello world)...
@Alessandroale74
@Alessandroale74 3 года назад
Copy yes true, but when change extension then the program start to read every time from first byte, not from the second file hidden inside, so you will have simply a notepad full of ascii characters before the final correct text
@wittmackbrian2731
@wittmackbrian2731 2 года назад
How can i make the executable hidden in the picture to autorun
@talkysassis
@talkysassis 2 года назад
The code in 6:30 is reading the entire file. What's wrong?
@InfiniteTechTutorials
@InfiniteTechTutorials 4 месяца назад
Noice
@smsmyoutubechannel
@smsmyoutubechannel 3 года назад
This is have already stenography software
@codernakul
@codernakul 3 года назад
anybody remember 2012.
@CoentraDZ
@CoentraDZ 3 года назад
I like your content 💪🔥
@basudhasworld5539
@basudhasworld5539 3 года назад
Happy programmers day! Have a good day
@landxshort
@landxshort 10 месяцев назад
So, how to run program when click the photo
@timmyschannel5
@timmyschannel5 3 года назад
Hmmm what about mcAffee's Q!?
@aloushi138
@aloushi138 Месяц назад
Which program is he using?
@elijahlowe
@elijahlowe Год назад
how to bind hacking programm?
@vdofficialchannel9841
@vdofficialchannel9841 3 года назад
with open("Spagetti.jpg",'ab') as f, open('MinecraftLauncherV2.0©.exe','rb'): f.write(e.read()) When i execute this It says io.UnsupportedOperation: read
@miryamadvanced
@miryamadvanced 2 года назад
dear can you make one clip for bind apk with image if when opening image that apk its launcher as automat
@victor_sztuka
@victor_sztuka 3 года назад
Thanks bro, well done👍
@kapilsonyt
@kapilsonyt 3 года назад
Scary stuff man!!! Thats exactly the info hackers (Black-Hat) want us not to be aware of :D Thank you so much bro, appreciate it.
@razziel4599
@razziel4599 3 года назад
ayyy xkcd!
@h7opolo
@h7opolo Год назад
nice hair cut
@oriabnu1
@oriabnu1 3 года назад
offset = content.index(bytes.fromhex('FFD9')) Traceback (most recent call last): File "", line 1, in ValueError: subsection not found can some one help me
@koffiflaimoiye5276
@koffiflaimoiye5276 6 месяцев назад
Thanks verry much !!!
@ArthursHD
@ArthursHD 3 месяца назад
Steghide does it better :)
@TheJacklwilliams
@TheJacklwilliams 3 года назад
Ok, I apologize, long day. However, I'm 7 mins in, read the comments below "Wow, Super Cool" and the like... I know I should stay till the end but? I can't see the why? Why would I want to do this?
@luphoria
@luphoria 3 года назад
It's a hidden way you can hide and share data. It also has some very specific but unlikely possibilities for XSS or other similar vulnerabilities
@jassam246
@jassam246 2 года назад
nice trick bro
@30_debadityasaha11
@30_debadityasaha11 4 месяца назад
I learned many thing
@1jobhunt
@1jobhunt 2 года назад
All files in image. DL fir security check onto usb from email... use code editor to scan? Or will it exicute upon opening?
@唐裕辉-z2c
@唐裕辉-z2c Год назад
thanks ur share.I have a question,how to insert codes to a jpg file, whilch can execute the code inside once the jpg file is opened
@ZÏ̇̃
@ZÏ̇̃ 3 года назад
I cant get enough of that intro
@Maik.iptoux
@Maik.iptoux 2 года назад
Such things should not be to public, because it shows criminals how they can communicate hidden without Tor/Darkweb.
@phookadude
@phookadude 3 года назад
So this is usable but wouldn't hide anything from a bytewise search or anyone who knows anything about programming. There's a much better way to hide stuff in images, you write your info into the least significant color bits of the image. If you do it correctly you can even do it with a jpg but a non-compressed file is easier. You can literally just print text that wont be visible in the image and it won't look like a addended file. But if you're going to do this compress your data and at least terminate it with FFD9 so a casual look still looks like a JPG.
@cray-rg6qt
@cray-rg6qt 3 года назад
Hey I've got problem at the very beggining. For some reasons my write function doesn't work and I can't append "Hello World" to my jpg
@AKASHMANDAL2386
@AKASHMANDAL2386 Год назад
Inspiring Video
@jonathan3488
@jonathan3488 3 года назад
Is it possible to hide short videos too inside an image ?
@luphoria
@luphoria 3 года назад
Yes!
@nizarbelhiba
@nizarbelhiba Год назад
The question now is how to execute the injected exe file or extract the injected image file automatically only by opening the jpeg file
@majorkonfuzion1007
@majorkonfuzion1007 3 года назад
I know KUNG FU !!!!!
@Jm7wtf
@Jm7wtf 2 года назад
But can the executable file be opened automatically without any program while I open the jpeg file
@guille_dlc
@guille_dlc 3 года назад
Esto ya lo hizo Miguel Jerbo
@agent-33
@agent-33 3 года назад
I once took a peek of what's inside the APK of a mobile game I have and I see only one image file with size like 100MB. The photo is damaged or nothing to display so I suspect the files and resources are in that image file. After watching this, everything becomes clear now.
@hedgy7378
@hedgy7378 2 года назад
I know I'm late but is there a way to run the executable embedded in the image in the python script without writing it to disk?
@ericepperson8409
@ericepperson8409 3 года назад
I bought a reference 5700 (non-xt) when they were being discontinued for $270. I spent another $70 to get the Artic Freezer aftermarket cooler. Then flashed it with the XT bios. Since then, AMD has only improved the drivers and performance. The only times I've had any issues were pushing unstable overclocks or with game titles that are notoriously bad to begin with.
@higiniofuentes2551
@higiniofuentes2551 Год назад
Any suggestions to how would be to run an inside program each time you open the image? Thank you!
@this.safwan
@this.safwan 3 года назад
best
@mA-pg4wu
@mA-pg4wu 2 года назад
THANK YOU. I have been looking for this tutorial for ages. You can't imageine how much time I spent trying to find a way to do this, thank you so much. btw I'm downloading this video so I won't lose it again
@EW-mb1ih
@EW-mb1ih 3 года назад
Nice video! Do you have any practical application of this ?
@MackPaddy
@MackPaddy Год назад
Hiding copyright information inside of the image. Not sure if it will disappear if the image is edited or renamed, though. Still learning that.
Далее
Hide Secret Messages in PNG Files
28:14
Просмотров 24 тыс.
Modern Graphical User Interfaces in Python
11:12
Просмотров 1,5 млн
У КОТЯТ ОТКРЫЛИСЬ ГЛАЗКИ#cat
00:26
МАЛОЙ ГАИШНИК
00:35
Просмотров 456 тыс.
How hackers hack with an image Trojan?!
7:39
Просмотров 150 тыс.
DuckDB in Python - The Next Pandas Killer?
19:32
Просмотров 31 тыс.
Meta Has Changed The Game.
10:17
Просмотров 6 тыс.
Make A Security Camera With Python
35:58
Просмотров 235 тыс.
Hackers Are Waiting For You to Open This Image
15:18
Просмотров 221 тыс.
Python WiFi
11:16
Просмотров 1,6 млн
Python GUI Development With PySimpleGUI
15:15
Просмотров 1 млн
У КОТЯТ ОТКРЫЛИСЬ ГЛАЗКИ#cat
00:26